- Injection Attacks
- Insertion of logical bombs
- Identity theft
- Authentication failure
- Privilage Escalation
Level | Application |
---|---|
Mandatory | The mandatory rules must be applied |
UX Researcher (conducts studies or interviews to help in knowing how people use the product) -> UX Writer (Think about how to make the language within a product clearer: make user experience moe intuitive) -> Product Desginer (Assets are handed off to engerineering team) -> UX Engineer (Translate the design's intent into a functioning experience ex web,app) -> UX Program Mangers (writing program goals)
"responsible disclosure program" | "vulnerability disclosure program" | "vulnerability program rewards" | "bug bounty reward program"
inurl: vulnerability disclosure inurl: responsible disclosure
amass enum -brute -active -d domain.com -o amass-output.txt
Strict-Transport-Security: max-age=3600
will tell the browser that for the next hour (3600 seconds) it should not interact with the applications with insecure protocols.adb install apk_name
pkg install openssh
sshd
pkill sshd
: to kill the serverifconfig
: see ap0 ip-address or try some other if this don't workwhoami
: ur usernameuname -a
gives complete usernameadb help // List all comands | |
== Adb Server | |
adb kill-server | |
adb start-server | |
== Adb Reboot | |
adb reboot | |
adb reboot recovery | |
adb reboot-bootloader |
curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh
source $HOME/.cargo/env
export PATH="$HOME/.cargo/bin:$PATH"
To do so: | |
1. Export your Burp Certificate | |
Proxy > Options > CA Certificate > Export in DER format | |
2. Convert it to PEM | |
openssl x509 -inform der -in cacert.der -out burp.pem | |
3. Download it on the device |
// Basic Types | |
let id: number = 5 | |
let company: string = 'Traversy Media' | |
let isPublished: boolean = true | |
let x: any = 'Hello' | |
let ids: number[] = [1, 2, 3, 4, 5] | |
let arr: any[] = [1, true, 'Hello'] | |
// Tuple |